Website map

Map mode: short, detailed, auto.

/ Cybersecurity of your applications, websites, networks, and organizations
     /cyber-7 Seven analogies between cyber and physical diseases
/about About H-X cybersecurity team. What makes us different. Company management. Competence. Certificates
     /vuln-mgt How to organize the full cycle of information security vulnerability management
/cases Case studies of completed projects. Our customers and their testimonials
/services Security assessment, implementation, compliance, training, and other services. Free and paid cybersecurity services
     /assess Information security assessment services
          /scan Vulnerability Scanning and Monitoring online
               /scan-tou Terms of Use for Vulnerability Scanner
               /scan-guide Vulnerability Scanner User Guide
          /code-review Security Analysis of Source Code
          /sc-audit Smart Contract Audit
               /sc-analyzer Free online Security Analysis of Smart Contracts
                    /sc-terms-of-use Terms of use of the Smart Contract Security Analyzer service
                    /sc-user-guide Smart Contract Security Analyzer User Guide
     /compliance Implementation and managed compliance with ISO 27001, PCI DSS, VDA ISA, and other security standards and regulations
          /iso-27001-checklist ISO 27001 Compliance Assessment Online Wizard
          /TISAX Implementation of VDA ISA and ENX TISAX®
               /VDA-TISAX Details on implementation of VDA ISA and obtain ENX TISAX® certification
               /check-TISAX VDA ISA and ENX TISAX® Compliance Assessment Online Wizard
     /pci-dss-gdpr Implementation and managed compliance with PCI DSS, GDPR, and other security regulations and standards
     /SOC Security Operations Center (SOC)
          /teamext Cybersecurity Team Extension Services and Continuous security by Remote CISO
          /website-SOC Continuous Protection of Websites
     /training Application Security Training and Consulting Services
     /appsec Application Security: Security DevOps, Secure Software Development Lifecycle, Training and Consulting Services
     /devs Software Engineering and DevOps Services
     /industrial Industrial IT/OT Security and SCADA Security Services
          /ICS-calc Industrial IT/OT Audit Calculator
     /forensic Cybersecurity Incident Response and Information Security Forensic Investigation services
/news Our news
     /incidents Cybersecurity incidents, threats, and industry news
     /partnership Doing business with H-X Technologies
     /career We are hiring!
/contact Contact us!
/faq FAQ (Frequently Asked Questions)
/policy Privacy and Confidentiality Policy
/map Map of this website

Follow us on the social networks:

Who we are, what we do and what we offer.

About penetration tests.

Our certificates:

Offensive Security